Академический Документы
Профессиональный Документы
Культура Документы
A New Design of Algorithm for Enhancing Security in Bluetooth Communication with Triple DES
1
B. Parsharamulu, 2 R. V. Krishnaiah
1 M.Tech Student, DRK Inst of Science & Technology, Hyderabad, India PhD, M. Tech in CSE from JNTU Hyderabad, M. Tech in EIE from NIT, Warangal, India
Abstract: Bluetooth technology is an emerging wireless networking standard, which is based on chip that provides short-range
wireless frequency hopping communication. Now, Bluetooth technology is mainly applied to the communication between mobile terminal devices, such as palm computers, mobile phones, laptops and so on. However, the phenomenon of data-leaking frequently arises in using the Bluetooth technology for data transfer. To enhance the security of data transmission in Bluetooth communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed by the Bluetooth to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric stream cipher called E0. The proposed hybrid encryption algorithm, instead of the E0 encryption, DES algorithm is used for data transmission because of its higher efficiency in block encryption, and RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in the Bluetooth system will be more secure. This project is extended with triple des in place of des to enhance more security.
1. Introduction
Encryption is an essential process to assure confidentiality over transmission channels, because channels are an open medium to intruders in which they can intercept and alter the contents of any transmitted information. Well known standardized encryption algorithms such as DES and AES were designed to achieve security against intruders. The encryption algorithm using in Bluetooth encryption process is the E0 stream cipher. However, this algorithm has some shortcomings, 128-bit E0 stream ciphers in some cases can be cracked by 0 (264) mode in some cases. So, for most applications that which need to give top priority to confidentiality, the data security is not enough if only use Bluetooth. Now I will introduce the Bluetooth mechanism, its disadvantages, and then propose a hybrid encryption algorithm to solve the current security risk in Bluetooth data transmission [1]. 1.1 Draw backs of old algorithm a. The weakness of E0 stream cipher algorithm b. Limited resources capacity of linear feedback shift registers LFSR. 1.2 Symmetric-key cryptography Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). This was the only kind of encryption publicly known until June 1976. The data encryption standard (DES) and the Advanced Encryption Standard (AES) are block cipher designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted).
1.2.1
Des algorithm
Despite its deprecation as an official standard, DES (especially its still- approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality [2].
279
Figure 2: Des algorithm The public key is typically used for encryption, while the private or secret key is used for decryption. Public-key algorithms are most often based on the computational complexity of "hard" problems, often from number theory. For example, the hardness of RSA is related to the integer factorization problem. 1.2.2 Single round of des algorithm Figure 4: Public-key cryptography 1.3.1 RSA algorithm First of all, two large distinct prime numbers p and q must be generated. The product of these, we call n is a component of the public key. It must be large enough such that the numbers p and q cannot be extracted from it - 512 bits at least i.e. numbers greater than 10154. We then generate the encryption key e which must be co-prime to the number m = (n) = (p 1) (q 1). We then create the decryption key d such that demodm = 1. We now have both the public and private keys [3]. Cipher text(C) = M^e mod (n). Plain text (M) = C^d mod (n).
2.1 The ideas and processes of hybrid algorithm RSA algorithm is the first relatively complete public key algorithm. It can be used for data encryption, also can be used for digital signature algorithms. RSA cryptosystem is used on the difficulty of integer factorization in the group, and its security establishes in the assumption that constructed by almost all the important mathematicians, it is still a theorem that does not permit, which is lack of
280
C. The second, RSA algorithm encrypts the key of DES algorithm. 3) Obtain RSA public key of receiver B from the key server, or other sources. 4) Make DES 64-bit session key K for RSA encryption by public key eB that obtains from recipient, then a session key encrypted information CK is formed. 5) Composite Cipher text message C from the use of DES encryption, and session key CK from RSA encryption, we can get the hybrid CM for transmission. Figure is the whole mixed-encryption process.
Figure 5: The whole mixed-encryption process 2.3 Process of decryption The decryption of hybrid encryption algorithm is as follows. The first, the receiver B divide received cipher text CM into two parts, one is cipher text CK from the RSA algorithm encryption, and the other is cipher text C from the DES algorithm encryption. The second, the receiver B decrypt cipher text CK by their private key dB, receive the key K which belongs DES algorithm, then decrypt the cipher text C to the original M by key K. Figure is a decryption of hybrid encryption algorithm [5].
281
4. Simulation Results
4.1 DES and RSA Hybrid Encryption Result
Figure 6: Proposed hybrid algorithm with Triple DES Triple DES uses a "key bundle" which comprises three DES keys, K1, K2 and K3, each of 56 bits (excluding parity bits). The encryption algorithm is: Cipher text = EK3 (DK2 (EK1 (plaintext))) I.e., DES encrypts with K1, DES decrypt with K2, and then DES encrypt with K3. Decryption is the reverse: Plaintext = DK1 (EK2 (DK3 (cipher text))) i.e., decrypt with K3, encrypt with K2, and then decrypt with K1.Each triple encryption encrypts one block of 64 bits of data. In each case the middle operation is the reverse of the first and last. Using standard DES encryption, TDES encrypts data three times and uses a different key for at least one of the three passes. The DES "modes of operation" may also be used with triple-DES. This 192-bit (24 characters) cipher uses three separate 64-bit keys and encrypts data using the DES algorithm three times. While anything less than that can be considered reasonably secure only the 192 bit (24 characters) encryption can provide true security. One variation that takes a single 192 bit (24 characters) key and then: encrypts data using first 64 bits (eight characters), decrypts same data using second 64 bits (eight characters), and encrypts same data using the last 64 bits (eight characters). For some time, it has been a common practice to protect and transport a key for DES encryption with triple-DES. This means that the plaintext is, in effect, encrypted three times. A number of modes of TDES have been proposed: DES-EEE3: Three DES encryptions with three different keys. DES-EDE3: Three DES operations in the sequence encrypt-decrypt-encrypt with three different keys. D E S -EEE2 and DES-EDE2: Same as the previous formats except that the first and third operations use the same key. Figure 7: Des and RSA Hybrid Encryption Result 4.2 DES and RSA hybrid decryption result
In this paper this hybrid encryption algorithm is proposed with triple des algorithm in the place of des algorithm. In triple des here we using 3 keys to encrypt the data, so the key strength becomes stronger, the data will be more
Paper ID: 12091302
282
6. Conclusion
Bluetooth technology is a new technology, which will change our transmission method. As communication networks, it uses wireless channel for the transmission medium. Compared to the fixed network Bluetooth network is more vulnerable to be attacked. Currently, stream cipher E0 used in Bluetooth standard has many shortcomings, while the DES and RSA hybrid encryption algorithm is relatively more secure and easier to achieve, thus ensures data transmission between the Bluetooth device safety and real-time. As long as we protect the key that encrypt original, and the security of entire file will be guaranteed. Because of the dual protection of DES algorithm and RSA algorithm, the data in transit is safe.
Figure 9: TDES and RSA hybrid encryption result 4.4 TDES and RSA hybrid decryption result
References
[1] Zheng Hu Network and Information Security [M], Peking; Tsinghua University. [2] Data encryption using DES/Triple DES functionality in Spartan-II FPGAS, Amit Dhir [3] Cryptanalysis of Bluetooth key stream Genarator twolevl E0. YiLu and Serge Vaudenay [4] Recommendations of the TDEA block cipher revised William C.Barker. [5] Cracking the Bluetooth PIN, Yaniv Shaked and Avishai Wool. [6] Man Young Rhee. Network Security Encryption Principle, algorithm and Protocol [M]. Peking: Tsinghua University Press, 2007. [7] WUxing-Hui ZHOU Yu-Ping.Analysis of data encryption algorithm based on WEB. Figure 10: TDES and RSA hybrid decryption result
Author Profile
B. Parsharamulu received B.Tech Degree in Computer Science & Engineering from Avanthi Inst of Engineering & Tech (2011), Hyderabad, and currently pursuing the M.Tech in CSE from JNTU Hyderabad. Dr. R. V. Krishnaiah has received Ph.D from JNTU Ananthapur, M.Tech in CSE from JNTU Hyderabad, M.Tech in EIE from NIT (former REC) Warangal and B.Tech in ECE from Bapatla Engineering College. He has published more than 50 papers in various journals. His interest includes Data Mining, Software Engineering, and Image Processing.
5.1 Future Scope This project leads to very useful to implement hybrid algorithms in Bluetooth communication technology. With the help of many algorithms like idea, Des, md5 and
283